Login / Signup
ALASTOR: Reconstructing the Provenance of Serverless Intrusions.
Pubali Datta
Isaac Polinsky
Muhammad Adil Inam
Adam Bates
William Enck
Published in:
USENIX Security Symposium (2022)
Keyphrases
</>
intrusion detection
intrusion detection system
metadata
anomaly detection
fine grained
network traffic
network security
data quality
search algorithm
malicious attacks
video sequences
hidden markov models
data structure
computer vision
scientific workflows
abnormal behavior
noisy observations
binary matrices